Connect Azure Resources to Microsoft Sentinel

Objective

Review these key concepts:

| Concept | Description | | ——————————- | —————————————————————————————————————————————- | | Microsoft Sentinel | A cloud-native SIEM/SOAR service that collects and analyzes security data from across Azure and other environments. | | Log Analytics Workspace | The foundational data store for Sentinel. All telemetry and log data are stored here. | | Data Connectors | Pre-built integrations that connect Azure and non-Azure resources to Sentinel (e.g., Azure Activity, Azure AD, VMs, Defender for Cloud). | | Workbooks & Analytics Rules | Workbooks visualize security data; analytics rules detect threats based on ingested logs. | —

Step 1: Create a Log Analytics Workspace

  1. Sign in to the Azure Portal → Search for Log Analytics workspacesclick + Create.
  2. Choose:
    • Subscription: (Your active subscription)
    • Resource group: SRE-Sentinel-Lab (create if not existing)
    • Name: SRE-LogAnalytics
    • Region: Same as your Azure resources (e.g., East US)
  3. Click Review + Create, then Create.

You should see your workspace in the list once deployment completes.

Step 2: Enable Microsoft Sentinel

  1. In the Azure Portal, search for Microsoft Sentinel.
  2. Select + Create.
  3. Choose the existing Log Analytics workspace SRE-LogAnalytics.
  4. Click Add to enable Sentinel on that workspace.

Sentinel should now appear in your resource list, linked to your workspace.

Step 3: Connect Azure Activity Logs

  1. Inside Sentinel, go to Data Connectors → search for Azure Activity.
  2. Click on the Azure Activity connector → Open connector page.
  3. Click Connect.
    • This streams all subscription-level activity logs (resource creation, deletion, access changes) to Sentinel.
  4. Wait a few minutes for ingestion to begin.

Verification: Go to Logs → run the query:

AzureActivity
| take 10

You should see recent subscription-level operations.

Step 4: Connect a Virtual Machine (via Log Analytics Agent)

  1. Go to your Azure Virtual Machine → Monitoring → Insights → Logs.
  2. Click Enable and select your existing SRE-LogAnalytics workspace.
  3. This automatically installs the Azure Monitor Agent (AMA) to send telemetry to Sentinel.

Verification: In Sentinel → Logs, run:

Heartbeat
| where Computer contains "your-vm-name"
| take 10

You should see heartbeat data confirming the connection.

Step 5: Connect Azure Key Vault Logs

  1. Go to Key Vaults → select your Key Vault → Diagnostics settings → Add diagnostic setting.
  2. Name it: KeyVaultToSentinel
  3. Under Category details, select:
    • AuditEvent
    • AllLogs
  4. Under Destination details, select Send to Log Analytics workspace → choose SRE-LogAnalytics.
  5. Click Save.

Verification: Run this query:

AzureDiagnostics
| where ResourceType == "VAULTS"
| take 10

Step 6: Create and Test a Workbook

  1. In Sentinel, go to Workbooks → + Add workbook.
  2. Choose a template like Azure Activity Overview or Key Vault Audit Logs.
  3. Click Save → Name it SRE-SecurityDashboard.
  4. Explore the visualizations — you should see activity data from your resources.

Challenge Task: Modify one chart to only show Key Vault activity.

Step 7: Enable Analytics Rules (Alerting)

  1. In Sentinel → Analytics → + Create → Scheduled Query Rule.
  2. Use the query:
    AzureActivity
    | where OperationNameValue == "Microsoft.Compute/virtualMachines/delete"
    | project TimeGenerated, Caller, ResourceGroup, Resource
    
  3. Name: VM Deletion Alert
  4. Set frequency: Every 5 minutes, look back 15 minutes.
  5. Under Incident settings, choose Create incidents from alerts → Enabled.
  6. Save the rule.

Test: Manually delete a test VM and check if an incident appears under Sentinel → Incidents.

Step 8: (Optional) Automate Response via Playbook

  1. In Sentinel → Automation → Playbooks → + Create.
  2. Choose Blank Logic App.
  3. Add a trigger When a response to an Azure Sentinel alert is triggered.
  4. Add an action (e.g., Send email via Outlook) to notify SREs when a VM deletion occurs.

You’ve implemented a basic SOAR action to complement SIEM alerts.

Questions:

💬
AI Learning Assistant